US9385920B1 - Rack having multiple rack management modules and firmware updating method for the same - Google Patents
Rack having multiple rack management modules and firmware updating method for the same Download PDFInfo
- Publication number
- US9385920B1 US9385920B1 US14/688,124 US201514688124A US9385920B1 US 9385920 B1 US9385920 B1 US 9385920B1 US 201514688124 A US201514688124 A US 201514688124A US 9385920 B1 US9385920 B1 US 9385920B1
- Authority
- US
- United States
- Prior art keywords
- rmc
- switch
- firmware
- memory
- rack management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 62
- 230000015654 memory Effects 0.000 claims abstract description 68
- 230000002159 abnormal effect Effects 0.000 claims description 9
- 230000005540 biological transmission Effects 0.000 claims description 8
- 238000001514 detection method Methods 0.000 claims description 8
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 108010028984 3-isopropylmalate dehydratase Proteins 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/082—Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/65—Updates
- G06F8/654—Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0654—Management of faults, events, alarms or notifications using network fault recovery
- H04L41/0659—Management of faults, events, alarms or notifications using network fault recovery by isolating or reconfiguring faulty entities
- H04L41/0661—Management of faults, events, alarms or notifications using network fault recovery by isolating or reconfiguring faulty entities by reconfiguring faulty entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0654—Management of faults, events, alarms or notifications using network fault recovery
- H04L41/0668—Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0695—Management of faults, events, alarms or notifications the faulty arrangement being the maintenance, administration or management system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/10—Active monitoring, e.g. heartbeat, ping or trace-route
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
Definitions
- the present invention relates to a rack, in particularly relates to a rack having multiple rack management modules, and a firmware updating method used by the rack.
- a server rack receives a plurality of servers and a Rack Management Controller (RMC).
- the rack administrators collect server information and control the servers via connecting the RMC to the servers.
- the RMC is a kind of System on Chip (SoC) with memories, and is booted via firmware.
- SoC System on Chip
- CPUs Central Processing Units
- the rack administrators have to perform updates on firmware of the RMC from time to time.
- the RMC receives firmware update images, and performs an update automatically on the firmware. Yet if the updating procedure is accidentally interrupted during execution (for example the servers crashed or the rack power is off), or the incorrect firmware is used in the updating procedure, after the RMC restarted, the RMC may not be able to boot normally. In the prior art, each rack is equipped with one RMC, accordingly if the RMC fails to boot normally, then all servers in the rack fail to function normally which is not desirable to server users.
- the rack is not able to re-update the firmware without external support (for example update manually by the rack administrators) for resolving the issue.
- the primary objective of the present invention is to provide a rack having multiple rack management modules and a firmware updating method for the same.
- the rack enables the rack management module to perform update on firmware of other rack management modules in order to avoid the issue that the rack management module is not able to boot normally after the firmware update fails, and further the rack is not able to re-update the firmware.
- the other objective of the present invention is to provide a rack having multiple rack management modules and a firmware updating method for the same, where the multiple rack modules perform heartbeat detection with each other, and provide backup solutions when other rack management modules is detected operating abnormally.
- the rack disclosed in the present invention has multiple rack management modules, each rack management module respectively comprises a rack management controller (RMC), a switch and a memory, wherein the switch of each rack management module is interconnected and respectively firmware is saved in each memory.
- RMC rack management controller
- the RMC receives external uploaded firmware update images
- the RMC sends a switching instruction to the switch for enabling the switch to switch and connect to the memory of another rack management module.
- the RMC executes a firmware updating procedure, the RMC perform an update on the firmware in the memory of another rack management module via switch connection.
- the RMC of the present invention does not perform update on the firmware of the same rack management module. Accordingly, even if the firmware updating procedure is accidentally interrupted leading to update failure, the RMC is able to boot normally after being reset regardless of the firmware update failure. Accordingly, even if the firmware updating procedure of the firmware fails, the RMC still is able to perform update on the firmware again until an update succeeds. Thus, the risk that the administrators are required to manually fix the RMC which is not able to boot normally due to firmware update failure is lowered.
- each rack management module is interconnected and performs heartbeat detection of each other.
- other rack management modules can be used to provide backup operation solutions. Accordingly, the issue that the whole rack is not able to function normally after the rack management modules have errors is excluded.
- FIG. 1 is a schematic view of a rack in the first embodiment according to the present invention
- FIG. 2 is a connection schematic view of a rack in the first embodiment according to the present invention.
- FIG. 3 is a schematic view of a firmware update operation in the first embodiment according to the present invention.
- FIG. 4 is a schematic view of a firmware update operation in the second embodiment according to the present invention.
- FIG. 5 is a flow chart for obtaining an updated image in the first embodiment according to the present invention.
- FIG. 6 is a flow chart for firmware update in the first embodiment according to the present invention.
- FIG. 7 is a backup flowchart in the first embodiment according to the present invention.
- FIG. 1 is a schematic view of a rack in the first embodiment according to the present invention.
- the rack 1 has multiple receiving slots for receiving multiple nodes 4 .
- the rack 1 also has multiple rack management modules, respectively and electrically connected with the nodes 4 used for collecting the information of the nodes 4 , and control the nodes 4 .
- a first rack management module 2 and a second rack management module 3 are used for illustrating the multiple rack management modules and the quantity is not limited thereto.
- each rack management module has a rack management controller (RMC), a switch and a memory.
- the RMC connects with the memory via the switch, and a firmware is saved in the memory and used by the RMC for booting.
- FIG. 2 is a connection schematic view of a rack in the first embodiment according to the present invention.
- the above first rack management module 2 has a first RMC 21 , a first switch 22 and a first memory 23 .
- the first RMC 21 connects to the first switch 22 , and connects to the first memory 23 via the first switch 22 .
- a first firmware 231 is saved in the first memory 23 and is used by the first RMC 21 .
- the second rack management module 3 has a second RMC 31 , a second switch 32 and a second memory 33 .
- the second RMC 31 connects to the second switch 32 , and connects to the second memory 33 via the second switch 32 .
- a second firmware 331 is saved in the second memory 33 and is used by the second RMC 31 .
- the first memory 23 and the second memory 33 is implemented as a Read Only Memory (ROM) and is not limited thereto.
- ROM Read Only Memory
- the first switch 22 connects to the first memory 23 via a first access channel L 1
- the second switch 32 connects to the second memory 33 via a second access channel L 2 .
- the first RMC 21 boots, the first RMC 21 retrieves the first memory 23 via the first access channel L 1 with the connection to the first switch 22 and executes the first firmware 231 for finishing the booting procedure.
- the second RMC 31 performs a boot, the second RMC 31 retrieves the second memory 33 via the second access channel L 2 with the connection to the second switch 32 , and executes the second firmware 331 for finishing the booting procedure.
- the switches of the multiple rack management modules are interconnected.
- the first switch 22 and the second switch 32 are interconnected. Further in details, in the embodiment, the first switch 22 and the second switch 32 are connected via a third access channel L 3 .
- the main technical characteristic of the present invention is that when the first RMC 21 executes a firmware updating procedure, the first RMC 21 performs an update on the second firmware 331 in the second memory 33 .
- the second RMC 31 executes the firmware updating procedure, the second RMC 31 performs an update on the first firmware 231 in the first memory 23 . Accordingly, the first RMC 21 is able to boot normally after being reset because of the update on the first firmware 231 performed by itself fails. Similarly, the second RMC 31 is able to boot normally after being reset because of the update on the second firmware 331 performed by itself fails.
- the first RMC 21 also connects to the first switch 22 via a first instruction transmission interface I 1 ; the second RMC 31 also connects to the second switch 32 via a second instruction transmission interface I 2 .
- the first RMC 21 executes the updating procedure, the first RMC 21 transmits a switching instruction to the first switch 22 via the first instruction transmission interface I 1 .
- the first switch 22 performs switching according to the switching instruction in order to connect to the second switch 32 via the third access channel L 3 , and connects to the second memory 33 via the second access channel L 2 .
- the first RMC 21 retrieves the second memory 33 respectively via the first switch 22 , the third access channel L 3 , the second switch 32 and the second access channel L 2 , so as to perform the updating procedure on the second firmware 331 .
- the second RMC 31 executes the updating procedure
- the second RMC 31 sends a switching instruction to the second switch 32 via the second instruction transmission interface I 2 .
- the second switch 32 performs switching according to the switching instruction in order to connect to the first switch 22 via the third access channel L 3 , and then connects to the first memory 23 via the first access channel L 1 .
- the second RMC 31 retrieves the first memory 23 respectively via the second switch 32 , the third access channel L 3 , the first switch 22 and the first access channel L 1 , so as to perform the updating procedure on the first firmware 231 .
- the RMCs of the multiple rack management modules are interconnected according to the present invention.
- the first RMC 21 and the second RMC 31 of the embodiment are interconnected. Further in details, the first RMC 21 and the second RMC 31 are connected via a communicating interface I/O.
- the communicating interface I 0 is a General Purpose I/O (GPIO) interface, a Universal Asynchronous Receiver/Transmitter (UART) interface, an Inter-Integrated Circuit (I 2 C) interface, an Intelligent Platform Management Bus (IPMB) interface, a Local Area Network (LAN) interface etc., and is not limited thereto.
- GPIO General Purpose I/O
- UART Universal Asynchronous Receiver/Transmitter
- I 2 C Inter-Integrated Circuit
- IPMB Intelligent Platform Management Bus
- LAN Local Area Network
- the first RMC 21 and the second RMC 31 perform heartbeat detection with each other via the communicating interface I 0 , and provide a backup operation solution.
- each RMC 21 , 31 detects abnormal heartbeat of another RMC via the communicating interface I 0 , the RMC is able to enforce the reset of the another RMC via sending an instruction through the communicating interface I 0 if an abnormal heartbeat of the another RMC is detected, and assign itself as an active RMC in the rack 1 .
- another RMC is able to perform backup operation. After the abnormal RMC is reset, then the operation is recovered to the original.
- the above technical solution can effectively avoid the issue that the multiple nodes in the rack are not able to operate normally when the only one RMC disposed in a rack has errors.
- FIG. 3 is a schematic view of a firmware update operation in the first embodiment according to the present invention.
- FIG. 3 is used for illustrating the operation flow of the first rack management module 2 .
- the first RMC 21 retrieves the first firmware 231 in the first memory 23 via the first switch 22 and the first access channel L 1 , and executes the first firmware 231 to finish the booting procedure.
- the first RMC 21 When the first RMC 21 receives a firmware update image F 1 and a updating command transmitted externally, the first RMC 21 sends a first switching instruction C 1 to the first switch 22 via the first instruction transmission interface I 1 , the first switch 22 switches and connects to the second switch 32 of the second rack management module 3 according to the first switching instruction C 1 .
- the first RMC 21 retrieves the second memory 33 via the first switch 22 , the third access channel L 3 , the second switch 32 and the second access channel L 2 , and the first RMC 21 performs an update on the second firmware 331 .
- the first RMC 21 is reset, and the first switch 22 is recovered to the initial settings (i.e., connect to the first memory 23 via the first access channel L 1 ).
- the booting procedure is still finished by executing the first firmware 231 in the first memory 23 .
- the booting operation of the first RMC 21 is not affected because the failed updating procedure is performed on the second firmware 331 .
- the first RMC 21 is installed with a first storage unit 211 for temporarily saving the externally transmitted firmware update image F 1 .
- the firmware update image F 1 temporarily saved in the first storage unit 211 is recorded to the second memory 33 in order to finish the updating procedure.
- the first storage unit 211 is a Random Access Memory (RAM) or a Flash Memory etc., and is not limited thereto.
- FIG. 4 is a schematic view of a firmware update operation in the second embodiment according to the present invention.
- FIG. 4 is used for illustrating the operation flow of the second rack management module 3 .
- the second RMC 31 retrieves the second firmware 331 in the second memory 33 via the second switch 32 and the second access channel L 2 and the booting procedure is finished by executing the second firmware 331 .
- the second RMC 31 When the second RMC 31 receives the firmware update image F 1 and the updating command, the second RMC 31 sends a second switching instruction C 2 to the second switch 32 via the second instruction transmission interface I 2 , the second switch 32 switches and connects to the first switch 22 of the first rack management module 2 according to the second switching instruction C 2 .
- the second RMC 31 retrieves the first memory 23 via the second switch 32 , the third access channel L 3 , the first switch 22 and the first access channel L 1 , and performs the updating procedure on the first firmware 231 .
- the second RMC 31 is reset, and the second switch 32 is recovered to the initial settings (i.e., connect to the second memory 33 via the second access channel L 2 ).
- the booting procedure is still finished by executing the second firmware 331 in the second memory 33 .
- the booting operation of the second RMC 31 is not affected because the failed updating procedure is performed on the first firmware 231 .
- a second storage unit 311 is installed in the second RMC 31 for temporarily saving the firmware update image F 1 .
- the firmware update image F 1 temporarily saved in the second storage unit 311 is recorded to the first memory 23 in order to finish the updating procedure.
- the second storage unit 311 is a RAM or a Flash Memory, and is not limited thereto.
- the multiple rack management modules of the rack 1 simultaneously receives the externally transmitted firmware update image F 1 and the updating command for respectively updating the firmware of the multiple rack management modules which assures that the firmware version is consistent. Nonetheless, the above is one of the preferred embodiments according to the present invention and is not limited thereto.
- FIG. 5 is a flow chart for obtaining an updated image in the first embodiment according to the present invention.
- the rack 1 is connected to an external update tool (for example a personal computer or a cloud server etc. not shown in the diagrams).
- the update tool sends a control command to the RMC in rack 1 via an interface (for example sends an IPMI command via an IPMI Interface) for enabling the RMC to enter an updating mode (step S 10 ).
- the RMC receives the firmware update image F 1 via the update tool (step S 12 ).
- the RMC temporarily saves the received firmware update image F 1 in an internal storage unit (step S 14 ), and check if the firmware update image F 1 is correct. If the firmware update image F 1 is correct, the RMC executes the updating procedure according to the temporarily saved firmware update image F 1 (step S 16 ).
- the first RMC 21 and the second RMC 31 both start to execute the updating procedure by following the above steps S 10 to step S 16 .
- FIG. 6 is a flow chart for firmware update in the first embodiment according to the present invention.
- the firmware update flow of the present invention is used in a rack with at least two rack management modules.
- the RMC in one of the rack management modules of the rack 1 receives the above mentioned updating command (step S 20 ).
- the RMC sends the switching instruction to the switch of the same rack management module (for example the first switch 22 ) for enabling the switch to switch and connect to the memory of another rack management module (for example the second memory 33 in the second rack management module 3 ) (step S 22 ).
- the RMC After the switch finishes switching, the RMC performs updating procedure on firmware in the memory of another rack management module according to the firmware update image F 1 temporarily saved in the installed storage unit (step S 24 ). After the updating procedures execution finishes, the RMC is reset, and the switch of the same the rack management module is recovered to the initial settings (step S 26 ), wherein, the switch connects to the memory of the same rack management module based on the initial settings after the step S 26 .
- the RMC which executes the updating procedure in the step S 24 After the RMC which executes the updating procedure in the step S 24 is reset, it connects to the memory of the same rack management module via the switch of the same rack management module, and executes the firmware in the memory to finish the booting procedure (step S 28 ). Lastly, the RMC determines if the previous updating procedure execution succeeds (step S 30 ). If the update fails, the step returns to step S 22 , and re-update the firmware of another rack management module. On the other hand, if the update succeeds, the RMC finishes the updating procedure.
- the updating method of the present invention can effectively avoid the issue that the RMC is not able to boot normally after the firmware updating procedure fails.
- FIG. 7 is a backup flowchart in the first embodiment according to the present invention.
- the backup flow of the present invention is implemented on the rack with at least two rack management modules. Firstly, the RMCs of the at least two rack management modules in the rack 1 are interconnected via the communicating interface I 0 , and performs a heartbeat detection via the communicating interface I 0 with each other (step S 40 ).
- each RMC respectively determines if the heartbeat of another RMC is abnormal (step S 42 ). If the heartbeat of another RMC is normal, the step S 40 is executed again in order to keep performing heartbeat detection on another RMC.
- the RMC with normal heartbeat sends the instruction via the communicating interface I 0 to enforce a reset of the RMC with abnormal heartbeat, and enable itself as the active RMC in the rack 1 (step S 44 ).
- the backup operation solution when one of the RMCs in the rack 1 operates abnormally, another RMC then performs backup operation temporarily, and recovered to the original operation after the RMC operates abnormally is reset. As a result, it is avoided that multiple nodes in the rack 1 are not able to operate normally after certain RMCs have errors.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Cardiology (AREA)
- General Health & Medical Sciences (AREA)
- Stored Programmes (AREA)
Abstract
Description
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/688,124 US9385920B1 (en) | 2015-04-16 | 2015-04-16 | Rack having multiple rack management modules and firmware updating method for the same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/688,124 US9385920B1 (en) | 2015-04-16 | 2015-04-16 | Rack having multiple rack management modules and firmware updating method for the same |
Publications (1)
Publication Number | Publication Date |
---|---|
US9385920B1 true US9385920B1 (en) | 2016-07-05 |
Family
ID=56235047
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/688,124 Expired - Fee Related US9385920B1 (en) | 2015-04-16 | 2015-04-16 | Rack having multiple rack management modules and firmware updating method for the same |
Country Status (1)
Country | Link |
---|---|
US (1) | US9385920B1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160070627A1 (en) * | 2014-09-08 | 2016-03-10 | Quanta Computer Inc. | Backup management control in a server system |
US20170156238A1 (en) * | 2015-11-30 | 2017-06-01 | Quanta Computer Inc. | Controlling air flow in a server rack |
US20210334112A1 (en) * | 2020-04-27 | 2021-10-28 | Fujitsu Limited | Information processing device and linking method |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050071837A1 (en) | 2003-09-29 | 2005-03-31 | International Business Machines Corporation | Automated control of a licensed internal code update on a storage controller |
US20050257213A1 (en) | 2004-05-14 | 2005-11-17 | International Business Machines Corporation | Management module failover across multiple blade center chassis |
US20060277538A1 (en) * | 2005-06-02 | 2006-12-07 | Microsoft Corporation | Dynamic process recovery in a distributed environment |
US20070174601A1 (en) * | 2006-01-03 | 2007-07-26 | Douglas Darren C | Apparatus, system, and method for firmware update of redundant controllers |
US20070234332A1 (en) * | 2006-02-22 | 2007-10-04 | Dell Products L.P. | Firmware update in an information handling system employing redundant management modules |
US20080256525A1 (en) * | 2007-04-13 | 2008-10-16 | International Business Machines Corporation | Automated firmware restoration to a peer programmable hardware device |
US20140123121A1 (en) * | 2012-10-31 | 2014-05-01 | Inventec Corporation | Rack and method thereof for simultaneously updating basic input output systems |
WO2014161986A1 (en) | 2013-04-04 | 2014-10-09 | Phoenix Contact Gmbh & Co.Kg | Control and data transfer system for redundant process control and method for firmware updating |
US20150199519A1 (en) * | 2009-09-08 | 2015-07-16 | Amazon Technologies, Inc. | Managing firmware update attempts |
-
2015
- 2015-04-16 US US14/688,124 patent/US9385920B1/en not_active Expired - Fee Related
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050071837A1 (en) | 2003-09-29 | 2005-03-31 | International Business Machines Corporation | Automated control of a licensed internal code update on a storage controller |
US20050257213A1 (en) | 2004-05-14 | 2005-11-17 | International Business Machines Corporation | Management module failover across multiple blade center chassis |
US20060277538A1 (en) * | 2005-06-02 | 2006-12-07 | Microsoft Corporation | Dynamic process recovery in a distributed environment |
US20070174601A1 (en) * | 2006-01-03 | 2007-07-26 | Douglas Darren C | Apparatus, system, and method for firmware update of redundant controllers |
US20070234332A1 (en) * | 2006-02-22 | 2007-10-04 | Dell Products L.P. | Firmware update in an information handling system employing redundant management modules |
US8707290B2 (en) * | 2006-02-22 | 2014-04-22 | Dell Products L.P. | Firmware update in an information handling system employing redundant management modules |
US20080256525A1 (en) * | 2007-04-13 | 2008-10-16 | International Business Machines Corporation | Automated firmware restoration to a peer programmable hardware device |
US20150199519A1 (en) * | 2009-09-08 | 2015-07-16 | Amazon Technologies, Inc. | Managing firmware update attempts |
US20140123121A1 (en) * | 2012-10-31 | 2014-05-01 | Inventec Corporation | Rack and method thereof for simultaneously updating basic input output systems |
WO2014161986A1 (en) | 2013-04-04 | 2014-10-09 | Phoenix Contact Gmbh & Co.Kg | Control and data transfer system for redundant process control and method for firmware updating |
Non-Patent Citations (1)
Title |
---|
Office Action dated Dec. 14, 2015 of the corresponding Finnish patent application. |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160070627A1 (en) * | 2014-09-08 | 2016-03-10 | Quanta Computer Inc. | Backup management control in a server system |
US9804937B2 (en) * | 2014-09-08 | 2017-10-31 | Quanta Computer Inc. | Backup backplane management control in a server rack system |
US20170156238A1 (en) * | 2015-11-30 | 2017-06-01 | Quanta Computer Inc. | Controlling air flow in a server rack |
US9936605B2 (en) * | 2015-11-30 | 2018-04-03 | Quanta Computer Inc. | Controlling air flow in a server rack |
US20210334112A1 (en) * | 2020-04-27 | 2021-10-28 | Fujitsu Limited | Information processing device and linking method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
FI127566B (en) | RACK WITH SEVERAL RACK MANAGEMENT MODULE AND HARDWARE UPDATE METHOD | |
US20160306623A1 (en) | Control module of node and firmware updating method for the control module | |
US10866623B2 (en) | Information handling system and method to detect and recover from no power/no post failures | |
US10698679B2 (en) | Server with double-firmware storage space and firmware update method therefor | |
US8930931B2 (en) | Information processing apparatus using updated firmware and system setting method | |
US8386764B2 (en) | BIOS architecture | |
US8640118B2 (en) | Managing firmware on a system board | |
US11314665B2 (en) | Information processing system, information processing device, BIOS updating method for information processing device, and BIOS updating program for information processing device | |
US20120110378A1 (en) | Firmware recovery system and method of baseboard management controller of computing device | |
TWI633487B (en) | Method and computer system for automatically recovering the bios image file | |
US20190073285A1 (en) | Information processing device and information processing method | |
US20160239370A1 (en) | Rack having automatic recovery function and automatic recovery method for the same | |
US9385920B1 (en) | Rack having multiple rack management modules and firmware updating method for the same | |
US20130117518A1 (en) | System controller, information processing system and method of saving and restoring data in the information processing system | |
CN105988844A (en) | Control module of endpoint server and firmware updating method thereof | |
US20130268745A1 (en) | Control method of computer, computer and computer system | |
CN115150273B (en) | Upgrade processing method and device | |
CN105843336B (en) | Cabinet with multiple cabinet management modules and firmware updating method thereof | |
TWI547873B (en) | Control module of server node and firmware updating method for the control module | |
CN110347558A (en) | A kind of server apparatus method for diagnosing faults and device and equipment | |
CN111221683A (en) | Double-flash hot backup method, system, terminal and storage medium for data center switch | |
CN112817642A (en) | Method and device for starting EFI operating system by X86 platform through automatic firmware switching | |
US20160026454A1 (en) | Circuit and method for writing program codes of basic input/output system | |
TWI726434B (en) | Control method for solving abnormal operation of me | |
CN118245292B (en) | Server restarting method and device, storage medium and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: AIC INC., TAIWAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHEN, YEN-YU;HSU, SHIH-CHIEH;REEL/FRAME:035424/0649 Effective date: 20150114 |
|
ZAAA | Notice of allowance and fees due |
Free format text: ORIGINAL CODE: NOA |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20240705 |